Chapter 5 Flashcards

1
Q

True or False? A Trojan horse infects a host program and may cause that host program to replicate itself to other computers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False? Overly aggressive malware prevention measures can become so intrusive that they can interfere with business functions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False? Each instance of malware has a unique set of instructions, called anti-malware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False? To limit the chances of a malware infection, a computer should be scanned regularly with one or more anti-malware software products.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False? Malware can alter or delete memory content or disk content that programs need to run.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which form of malware scanning compares the observed behavior of a program with stored malware behavior?

A

Heuristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a game rather than a form of malware?

A

Darwin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is advertising-developed software used mostly in web browsers and creates income from those who visit websites and click on links?

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an example of an aggressive malware prevention strategy?

A

Limiting web browser functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Victor is responsible for configuring his company’s antivirus policy. The antivirus application will perform a quick scan every day at 1:00 P.M. and perform a full scan every Sunday. What was the main idea behind Victor’s choice of scan and timing?

A

Victor seeks to minimize the impact on employees’ computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False? Whereas some malware disrupts computer operations, other malware may gather sensitive information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False? A rootkit is a type of malware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which form of malware logs keystrokes and collects (or sends) them for malicious use and intent?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A type of malware may behave like a Trojan horse initially, but after activation it may limit the user’s ability to access the computer, limit access by slowing down the computer, deny access for authorized users, block access to specific programs or resources, or encrypt important files or the entire disk. Which malware has been described?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where can you add directories that you want to omit from scans in Malwarebytes?

A

Exclusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of malware is a deceptive program that spoofs a harmless or useful program, but actually stores other malware?

17
Q

Attacks against previously unknown vulnerabilities that give network security specialists virtually no time to protect against them are referred to as:

A

zero-day attacks

18
Q

Which of the following types of malware is a set of programs that alter the operating system’s functionality in order to hide themselves?

19
Q

Which of the following types of malware is self-replicating within computer systems and may have a payload that can delete files on the host computer?